[1] |
LI Shuang.
Certificateless Public Key Encryption with Keyword Search
[J]. Computer Engineering and Applications, 2020, 56(20): 93-97.
|
[2] |
CHEN Hong, ZHU Yanan, XIAO Chenglong, JIN Haibo, ZHANG Zihao.
Publicly Verifiable Certificateless Multi-receiver Anonymous Signcryption
[J]. Computer Engineering and Applications, 2020, 56(19): 120-125.
|
[3] |
DONG Xuedong, HAN Shuo, ZHANG Cheng.
New Paillier Digital Signature Scheme Based on Cubic Residue
[J]. Computer Engineering and Applications, 2020, 56(18): 77-81.
|
[4] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[5] |
MENG Yuan, TU Shanshan, YU Jinliang.
Detection Scheme of Impersonation Attack Based on DQL Algorithm in Fog Computing
[J]. Computer Engineering and Applications, 2020, 56(10): 63-68.
|
[6] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[7] |
NIU Shufen, YANG Xiyan, LI Zhenbin, WANG Caifen.
Hybrid Signcryption Scheme Based on Heterogeneous System
[J]. Computer Engineering and Applications, 2019, 55(3): 61-67.
|
[8] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[9] |
DENG Fei1, ZHU Ying2.
Novel one-round certificateless group authenticated key agreement protocol
[J]. Computer Engineering and Applications, 2017, 53(5): 111-115.
|
[10] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[11] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[12] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|
[13] |
MI Junli1, ZHANG Jianzhong2, CHEN Shouting1, LIU Fenghua1.
Leakage-resilient designated verifier blind proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(22): 123-126.
|
[14] |
LI Yarong1, LI Xiao1, HE Mingxing2, LIU Xiaojian2, GE Lixia1.
Security analysis and improvement of forward secure proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(14): 110-114.
|
[15] |
LIU Jianhua1,2, ZHAO Changxiao2, MAO Kefei3.
Efficient certificateless aggregate signcryption scheme based on XOR
[J]. Computer Engineering and Applications, 2016, 52(12): 131-135.
|